Process to requesting an Instructional-Only Computer setup offered through the Dean's Office Undergraduate Instructional Fund. Fund allows for a full standard setup to include a 24in monitor, full qwerty keyboard, wired mouse, and a dock if it is a windows machine. The purchase of any specialized software that is not currently funded by the College or UT (Mathematica, Matlab, Microsoft suite) is the responsibility of the instructor and their department. Adapters to be used in classroom spaces will also be supplied with the system. The expectation is that the system will be used in an instructional setting where students benefit from the use such as in a classroom setting. CNS classrooms have computers with a standardized set of software. If there is a need for other software, it is the responsibility of the instructor to use this laptop to share out the application in class via video adapters connected to the podium in the classroom.
Step-by-step guide
Step 1:
- Verify you have taken the IT Security Awareness training. To check your status, please go to: IT Security Awareness
- If you are a new faculty member, please complete the training within 60 days of your start date
- Verify you have read and signed the ISO Acceptable Use Form
...
Info |
---|
These are instructional use-only systems. They are not designed for research needs. Any data or application that is research-based is not subject to full support from CNS IT. These needs are addressed with a Best Effort approach. Management tools are installed for inventory and campus compliance audits. CNS IT will also use these tools to assist with troubleshooting efforts. Removal of these tools or the CNSDOIT administrative account is subject to revocation of the system as it violates the intended purpose of said system. Systems are subject to audits by University IT folk. Any personal data on any UT device is subject to open records requests. Regular admin usage for daily tasks is against UT policy. System users are required to only use an admin account when necessary and run all tasks as a standard user. All University Employees MUST take IT Security Training. To check your status, please go to: IT Security Awareness All University Employees MUST sign the Acceptable Use Policy after reading ISO Acceptable Use Form |
Related articles
Filter by label (Content by label) | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
...